clickjacking revisited
play

Clickjacking Revisited A Perceptual View of UI Security Devdatta - PowerPoint PPT Presentation

Clickjacking Revisited A Perceptual View of UI Security Devdatta Akhawe / Warren He / Zhiwei Li/ Reza Moazzezi / Dawn Song University of California, Berkeley Clickjacking is a malicious technique of tricking a Web user into clicking on something


  1. Clickjacking Revisited A Perceptual View of UI Security Devdatta Akhawe / Warren He / Zhiwei Li/ Reza Moazzezi / Dawn Song University of California, Berkeley

  2. Clickjacking is a malicious technique of tricking a Web user into clicking on something different from what the user perceives (wikipedia)

  3. Today Five novel clickjacking attacks that bypass current defenses Evaluation with 250 users on MTurk

  4. Attack Setup • Attacker wants to trick user into clicking a button, in our case, the Facebook like button • Attacker convinces user to play a game on attacker controlled webpage • Attacker can frame the Facebook Like button, but has no control over the FB display area/frame • Attacker has full control of remaining display area

  5. Attacker page

  6. A successful attack (bypassing current defenses) requires the like button be fully visible for a noticeable amount of time (say ~500ms)

  7. Destabilizing Pointer Perception

  8. Video Demo

  9. Player clicks Like button by mistake Finally, close to the target, player corrects in a sudden User keeps moving up and right motion, moving the real (black), but fake pointer (red) pointer towards right Fake pointer starts moving stays left, confusing the user to the left (red) Player starts moving mouse

  10. Successful Attack • One concern is the appearance of the real pointer when it approaches the like button – Attacker has no control over “Like” button frame • Key Idea: distract the player’s attention with lots of moving images

  11. Real Attack

  12. Attacking Peripheral Vision

  13. Game Setup

  14. But, watch main game area at top right Player must leave mouse at bottom of screen

  15. (a) time Sensor Blocks Player

  16. (c) pause (b) (a) time Sensor Blocks Player

  17. Motor Adaptation

  18. Game Setup

  19. Player presented with asteroid

  20. Mineral produced at constant Player must click displacement on this mineral for points Asteroid explodes when clicked

  21. Once trained, put like button instead of mineral

  22. Fast Motion Mislocalization

  23. Game Setup

  24. Player presented with asteroid with spinning arrow

  25. Player must click on mineral for points When arrow stop, mineral shoots out

  26. The Flash Lag Effect • Flash lag is a visual illusion where a moving object, at a particular instant, seems further ahead than it actually is • Brain predicts future displacement • The player’s click is actually beyond the mineral, but we still award points

  27. After a few trials, put like button beyond mineral

  28. Visual Cues and Click Timing

  29. Game Setup

  30. Negative points for clicking on grey asteroid Positive points for clicking on red asteroid

  31. Move asteroid under a like button

  32. Evaluation

  33. Evaluation • MTurk study with 50 workers for each attack. Attacks 2 through 5 work for touch devices too! • Some subjects exited before completing the exercise Attack Name Number of subjects Success Rate (%) Destabilizing Pointer Perception 50 100 Peripheral Vision 49 51.02 Adaptation 46 28.26 Fast Motion Mislocalization 47 27.66 Visual Cue for timing 50 50

  34. This is only a lower- bound …

  35. Complex Attacks • Our attacks are simple. Possible to dynamically adapt the attack as user plays the games. • Better models of pointer movement and click prediction can improve success rates. • Each attack targets a different limitation of human perception. A combined attack likely to achieve 100% success.

  36. More Attacks • Human perception is a vast and well studied topic. Many more attacks possible. • For example, Change Blindness: – Well studied phenomenon in which user fails to notice difference in two images. – Attacker can switch in a like button and an appropriately primed user won’t notice.

  37. Future Work

  38. Future Work • Secure UI design needs to take human perception in account while designing interfaces – Changes needed to specifications such as the UI Security specification • Computer Vision based techniques (or machine perception) could be key for defenses • Designing a secure user interaction mechanism critical for security

  39. evil@berkeley.edu questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend